About me

With an extensive experience in Cybersecurity and globally recognized certifications including CISSP, ISO 27001, and CRISC, I bring deep expertise in safeguarding digital ecosystems. Over the years, I have cultivated a career focused on identifying and managing cyber and privacy risks across diverse industries.

My professional journey began in governance and compliance, where I built a strong foundation in regulatory alignment and organizational resilience. I later found my passion in risk management—developing risk appetites, defining tolerances, and building predictive Key Risk Indicators (KRIs) to anticipate emerging threats before they escalate.

In addition to core risk functions, I have extensive hands-on experience in third-party risk management, compliance assessments, and delivering engaging training and awareness programs that empower teams and elevate security cultures.

Whether you're facing complex compliance demands or seeking to proactively manage risk, I offer strategic guidance tailored to your needs.

Let’s connect—where cybersecurity expertise meets practical, risk-driven solutions.

person holding light bulb
person holding light bulb

Cybersecurity Projects

Freelance services focused on enhancing digital security for clients.

A person wearing glasses and a hoodie is seated at a table, focused on typing on a laptop. The room has a modern and tech-oriented ambience with a screen mounted on the wall displaying lines of code. Shelves and cabinets are visible in the background, adding to the organized workspace setting.
A person wearing glasses and a hoodie is seated at a table, focused on typing on a laptop. The room has a modern and tech-oriented ambience with a screen mounted on the wall displaying lines of code. Shelves and cabinets are visible in the background, adding to the organized workspace setting.
Cyber Security Compliance

Comprehensive analysis of systems to identify compliance gaps.

A person is working on a laptop displaying code in a text editor. The environment is a wooden table with various items including a pair of headphones, a red external hard drive, and some documents. The screen shows lines of code, indicating software development or programming activity.
A person is working on a laptop displaying code in a text editor. The environment is a wooden table with various items including a pair of headphones, a red external hard drive, and some documents. The screen shows lines of code, indicating software development or programming activity.
Risk Assessment

Evaluating potential threats to ensure business continuity and safety.

woman wearing yellow long-sleeved dress under white clouds and blue sky during daytime

Rakannasser provided exceptional cybersecurity services that greatly improved my business's online security and peace of mind.

John Doe

A person wearing glasses is working on a computer setup with multiple screens. The large monitor displays web designs, and the laptop screen shows code. The workspace is lit with soft ambient lighting, and a gaming desktop is visible beside the person.
A person wearing glasses is working on a computer setup with multiple screens. The large monitor displays web designs, and the laptop screen shows code. The workspace is lit with soft ambient lighting, and a gaming desktop is visible beside the person.

The professionalism and expertise of Rakannasser in cybersecurity are unmatched; highly recommend for any business needs.

Jane Smith

A person wearing a red jacket and a white face mask is focused on typing at a silver laptop on a wooden table. The background shows large glass windows revealing an urban landscape with buildings and a partly cloudy sky.
A person wearing a red jacket and a white face mask is focused on typing at a silver laptop on a wooden table. The background shows large glass windows revealing an urban landscape with buildings and a partly cloudy sky.
★★★★★
★★★★★